• Title/Summary/Keyword: wsn

Search Result 891, Processing Time 0.027 seconds

CoAP handover procedure for reducing memory load of lightweight IoT device (경량 IoT 디바이스의 메모리 점유율 감소를 위한 CoAP 핸드오버 절차)

  • Ahn, Seyoung;Kim, Teasung;Kim, Jeehyeong;Cho, Sunghyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.135-136
    • /
    • 2018
  • CoAP을 사용하는 IoT 기기는 핸드오버를 시행하는 동안 주기적으로 보내야 하는 메시지를 보내지 않고 메모리에 저장한다. 그로 인한 경량 IoT 기기의 메모리 요구량의 감소를 위한 핸드오버 절차를 제안한다. 제안하는 절차에서는 센서 노드가 핸드오버 이전에 현재 기지국에 미리 핸드오버 요청을 보낸다. 따라서 센서 노드가 이웃한 기지국에게 핸드오버 요청을 했을 때, 이웃한 기지국은 현재 기지국에게 핸드오버 알림을 주지 않는다. 본 연구에서는 시뮬레이션을 통하여 제안하는 핸드오버 절차로 인한 observe 메시지의 메모리 점유율을 50%가량 줄인다.

  • PDF

복분자 즙을 첨가한 Appenzeller cheese 의 품질 특성

  • Bae, In-Hyu;O, Dong-Hwan;Jo, Seong-Gyun;Yang, Cheol-Ju;Gong, Il-Geun;Min, Won-Gi;Park, Jeong-Ro;Park, Su-Rin;Choe, Hui-Yeong;Choe, Hyo-Ju;Hwang, Cheol-Ho;Park, Eun-Ha
    • Proceedings of the Korean Society for Food Science of Animal Resources Conference
    • /
    • 2004.05a
    • /
    • pp.298-300
    • /
    • 2004
  • 본 연구에서는 생리 활성 효과가 기대되며, 기능적으로 활성도가 높은 복분자즙을 실용적으로 활용하는 방안으로 복분자즙의 치즈 원유 첨가비를 달리한 (2%, 4%, 6%) 아펜젤러 치즈를 제조 하였다. 각 처리구별 치즈를 4개월간 숙성하면서 숙성중 치즈의 생균수.pH NPN(non protein nitrogen) , NCN(non casein nitrogen) , WSN (water soluble nitrogen)의 함량 변화를 조사하였다. 치즈 첨가함량별 치즈제조 및 숙성 결과 4%구에서 높은 숙성도를 보였고 관능검사에서도 6%구에서 높은 기호도를 나타내 추가적인 연구가 수행된다면 이상적인 한국적 기능성 자연 치즈 개발이 가능할 것으로 기대 되었다.

  • PDF

A Novel Approach of Sensor Node Location Tracking using Routing Information in Wireless Sensor Network (WSN에서 라우팅 정보를 이용한 센서 노드 위치 추적에 관한 연구)

  • Bae, Ji-Hye;Yun, Nam-Sik;Park, Yoon-Young;Kim, Jae-Myoung;Lim, Dong-Sun
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.262-265
    • /
    • 2008
  • 수천 개의 센서 노드들 간의 공동 작업을 기반으로 한 무선 센서 네트워크는 대규모 서식지 모니터링, 침입 탐지, 자동화된 실시간 위치 평가, 홈 어플리케이션, 과학적인 탐사 등 수많은 응용에 대한 새로운 플랫폼을 제공하고 있다. 본 논문은 수천 개의 센서노드들이 센서 필드에 전개되어 있는 경우에 센서 노드의 상태를 효율적으로 관리하기 위해 센서 노드의 위치를 탐지하기 위한 방법에 관하여 기술하였다. 기본적으로 PEGASIS 라우팅 알고리즘을 이용하여 노드들 간의 상대 거리 정보를 수집하여 센서 노드의 위치 정보를 탐지하였다.

  • PDF

Symptoms-Based Power-Efficient Communication Scheme in WBSN

  • Sasi, Juniven Isin D.;Yang, Hyunho
    • Smart Media Journal
    • /
    • v.3 no.1
    • /
    • pp.28-32
    • /
    • 2014
  • It is practical nowadays to automate data recording in order to prevent loss and tampering of records. There are existing technologies that satisfy this needs and one of them is wireless sensor networks (WSN). Wireless body sensor networks (WBSN) are wireless networks and information-processing systems which are deployed to monitor medical condition of patients. In terms of performance, WBSNs are restricted by energy, and communication between nodes. In this paper, we focused in improving the performance of communication to achieve less energy consumption and to save power. The main idea of this paper is to prioritize nodes that exhibit a sudden change of vital signs that could put the patient at risk. Cluster head is the main focus of this study in order to be effective; its main role is to check the sent data of the patient that exceeds threshold then transfer to the sink node. The proposed scheme implemented added a time-based protocol to sleep/wakeup mechanism for the sensor nodes. We seek to achieve a low energy consumption and significant throughput in this study.

Multiregional secure localization using compressive sensing in wireless sensor networks

  • Liu, Chang;Yao, Xiangju;Luo, Juan
    • ETRI Journal
    • /
    • v.41 no.6
    • /
    • pp.739-749
    • /
    • 2019
  • Security and accuracy are two issues in the localization of wireless sensor networks (WSNs) that are difficult to balance in hostile indoor environments. Massive numbers of malicious positioning requests may cause the functional failure of an entire WSN. To eliminate the misjudgments caused by malicious nodes, we propose a compressive-sensing-based multiregional secure localization (CSMR_SL) algorithm to reduce the impact of malicious users on secure positioning by considering the resource-constrained nature of WSNs. In CSMR_SL, a multiregion offline mechanism is introduced to identify malicious nodes and a preprocessing procedure is adopted to weight and balance the contributions of anchor nodes. Simulation results show that CSMR_SL may significantly improve robustness against attacks and reduce the influence of indoor environments while maintaining sufficient accuracy levels.

An efficient topology scheme based on active node selecting methods (활성화 노드 선택 기법을 기반으로 한 효율적인 토폴로지 설계)

  • Chung, Jae-Tak;Yun, Jang-Kyu;Park, Jin-Hyo;Chung, Won-Sung;Han, Ki-Jun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.157-158
    • /
    • 2006
  • 무선 센서 네트워크에서 각 센서 노드는 에너지의 한계를 가지기 때문에, 에너지 소비문제는 매우 중요한 이슈이다. 조밀한 환경의 센서 네트워크에서 모든 노드들이 센싱에 참여한다면, 센싱영역의 중복영역이 커지게 되고, 이로 인해 불필요한 에너지를 소비하게 된다. 본 논문에서는 WSN 에서 connectivity 와 coverage 를 보장할 수 있는 효율적인 활성화 노드를 선택하는 기법을 제안하여, 불필요한 센서노드들의 에너지소비를 막고 전체적인 네트워크의 lifetime 을 연장시키고자 한다

  • PDF

A Study On Ubiquitous Sensor Network Technologies (유비쿼터스 센서 네트워크 기술에 관한 연구)

  • Lee, Hyeon-Jae;Lee, Houn-Taek;Shin, Hyun-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.1
    • /
    • pp.70-77
    • /
    • 2009
  • In this paper, we study the development trend of Ubiquitous Sensor Network Technologies which represent social, environmental and technical development at 21century. To understand and forecast various Ubiquitous Sensor Network Technologies, we introduce element technic; hardware platforms, sensor operating system sensor interface and sensor middleware.

  • PDF

Analyses of Requirement of Security and Threat of IoT Application (사물 인터넷 통신망의 적용에 따른 보안 위협과 보안 요구사항 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1025-1026
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in real word. Connecting wireless sensor networks with traditional communication networks or Internet, IoT gateway plays an important role in IoT applications. It facilitates the integration of wireless sensor networks and mobile communication networks or Internet. The IoT gateway is a key component in IoT application systems. But It has lot of security issues. We analyzed the issues of security and privacy.

  • PDF

Analyses of Security and Privacy Challenges in Industrial Based on Internet of Things (사물 인터넷망에 기반한 산업 시설의 보안 요구 사항 해석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.598-599
    • /
    • 2016
  • Today, embedded, mobile, and cyber-physical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industry 4.0" and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. We survey an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems in this paper.

  • PDF

Analyses of Network Performance Based on VPN Protocols (VPN 프로토콜에 기반한 네트워크 성능 분석)

  • Jang, Chang-Whan;Lee, Min-Suk;Jo, Sung-Ho;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.589-590
    • /
    • 2016
  • Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. This is important matters because these networks can be set-up with a lower cost of ownership compared to other means of securing communications. VPN is a proven technology that does provide security strong enough for business use. However, performance of these networks is also important in that lowering network and server resources can lower costs and improve user satisfaction. We analyzed network performance analysis of VPN protocols.

  • PDF